Easily exploitable security vulnerability found in Linux TCP from version 3.6 especially concerning unencrypted connections

in linux •  2 years ago

The attacker needs to know the two IP addresses and ports and the next serial number of the challenge ACK packets introduced in RFC 5961. These can be used to spoof packets and for example inject malicious code in HTTP traffic. For encrypted traffic like HTTPS and SSH this attack can only break the connection.

Links:
http://www.theregister.co.uk/2016/08/10/linux_tor_users_open_corrupted_communications/
https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!